Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:25
Static task
static1
Behavioral task
behavioral1
Sample
document.vbs
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
document.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
overhauled/pees.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
overhauled/pees.dll
Resource
win10v2004-20221111-en
General
-
Target
document.vbs
-
Size
9KB
-
MD5
2d18b6b6e6f10d17657cf6dad66e8f0d
-
SHA1
28a46af66cb32e7ea0a1ed0f62b88054ef3e7dbb
-
SHA256
439b5d1bc5e28f08b5e9dfa21c133a8736ed236da208ace9974606075bee1882
-
SHA512
9fe42ee2fa1225b1d6524c16d3d249f1424278e76c7b9a3d3486737357f48674511a629ce4e0cbd1eeae90444c0b7e2762d28ab60eb4ef0d7ac3f5226b09e545
-
SSDEEP
192:WeSjpUorcl/E4hp3aD/OCMhiEe1mUS1G0vdzgW20fkbsgTbpQt:N4pnrcpE4hpPCMhidmnGm80jWb4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WScript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
WScript.exerundll32.exedescription pid process target process PID 5104 wrote to memory of 2180 5104 WScript.exe rundll32.exe PID 5104 wrote to memory of 2180 5104 WScript.exe rundll32.exe PID 2180 wrote to memory of 2188 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2188 2180 rundll32.exe rundll32.exe PID 2180 wrote to memory of 2188 2180 rundll32.exe rundll32.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\document.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" overhauled\\pees.temp,CuMode2⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" overhauled\\pees.temp,CuMode3⤵PID:2188